Researches Utilize Machine Learning to Perform Fingerprinting Attacks on Tor
http://bit.ly/2JGnQPK
Submitted May 16, 2019 at 02:00PM by TheProgrammar89
via reddit http://bit.ly/2Wd1sV6
http://bit.ly/2JGnQPK
Submitted May 16, 2019 at 02:00PM by TheProgrammar89
via reddit http://bit.ly/2Wd1sV6
RIT
RIT cyber fighters go deep on Tor security
Recognizing that the internet is not always secure, millions of people are turning to the Tor anonymity system as a way to browse the World Wide Web more privately. However, Tor has been found to have its own vulnerabilities. This has a team of faculty and…
Breaking UC Browser
http://bit.ly/2HqFPIJ
Submitted May 16, 2019 at 04:44PM by atomlib_com
via reddit http://bit.ly/2LNcI6u
http://bit.ly/2HqFPIJ
Submitted May 16, 2019 at 04:44PM by atomlib_com
via reddit http://bit.ly/2LNcI6u
Habr
Breaking UC Browser
Introduction At the end of March we reported on the hidden potential to download and run unverified code in UC Browser. Today we will examine in detail how it...
Thrangrycat, Cisco command Injection Vulnerability of http server & secure boot tampering
http://bit.ly/2WIvblt
Submitted May 16, 2019 at 04:12PM by Z3t4
via reddit http://bit.ly/2EfqKaJ
http://bit.ly/2WIvblt
Submitted May 16, 2019 at 04:12PM by Z3t4
via reddit http://bit.ly/2EfqKaJ
reddit
r/netsec - Thrangrycat, Cisco command Injection Vulnerability of http server & secure boot tampering
0 votes and 0 comments so far on Reddit
A Simple and Comprehensive Vulnerability Scanner for Containers, Compatible with CI
http://bit.ly/2VDXyVE
Submitted May 16, 2019 at 05:36PM by knqyf263
via reddit http://bit.ly/2Hu0J8m
http://bit.ly/2VDXyVE
Submitted May 16, 2019 at 05:36PM by knqyf263
via reddit http://bit.ly/2Hu0J8m
GitHub
knqyf263/trivy
A Simple and Comprehensive Vulnerability Scanner for Containers, Compatible with CI - knqyf263/trivy
Security Update - Stack Overflow Blog
http://bit.ly/2YDoYIp
Submitted May 17, 2019 at 01:33AM by TeamFlare
via reddit http://bit.ly/2HoX9Od
http://bit.ly/2YDoYIp
Submitted May 17, 2019 at 01:33AM by TeamFlare
via reddit http://bit.ly/2HoX9Od
Stack Overflow Blog
Security Update
Over the weekend, there was an attack on Stack Overflow. We have confirmed that some level of production access was gained on May 11. We discovered and investigated the extent of the access and are addressing all known vulnerabilities. We have not identified…
Certexfil, “Abusing certificates for data exfiltration”
http://bit.ly/2HhENxk
Submitted May 17, 2019 at 07:59AM by sourcefrenchy
via reddit http://bit.ly/2HlYKE9
http://bit.ly/2HhENxk
Submitted May 17, 2019 at 07:59AM by sourcefrenchy
via reddit http://bit.ly/2HlYKE9
Medium
Exfiltration series: Certexfil
“Data exfiltration occurs when malware and/or a malicious actor carries out an unauthorized data transfer from a computer.” — Wikipedia
JWT: python noscript that performs a MAC-vs-Signature attack (retrieves public key through JWKS)
http://bit.ly/2Hp4ayp
Submitted May 17, 2019 at 12:32PM by andreashappe
via reddit http://bit.ly/2WOqEyb
http://bit.ly/2Hp4ayp
Submitted May 17, 2019 at 12:32PM by andreashappe
via reddit http://bit.ly/2WOqEyb
reddit
r/netsec - JWT: python noscript that performs a MAC-vs-Signature attack (retrieves public key through JWKS)
0 votes and 1 comment so far on Reddit
Pown CDB - Interactive HTTP Interception Tool (no proxies) for Chrome and other browsers
http://bit.ly/2JqIxjj
Submitted May 17, 2019 at 02:58PM by _pdp_
via reddit http://bit.ly/2JKFfH1
http://bit.ly/2JqIxjj
Submitted May 17, 2019 at 02:58PM by _pdp_
via reddit http://bit.ly/2JKFfH1
GitHub
pownjs/pown-cdb
Contribute to pownjs/pown-cdb development by creating an account on GitHub.
Search Engine Abuse in Popular Social Networks
http://bit.ly/2JrGFXU
Submitted May 17, 2019 at 06:02PM by mazen160
via reddit http://bit.ly/2JM9ZaK
http://bit.ly/2JrGFXU
Submitted May 17, 2019 at 06:02PM by mazen160
via reddit http://bit.ly/2JM9ZaK
Medium
Search Engine Abuse in Popular Social Networks
- This is a blog post by Mazin Ahmed and Khaled Farah.
Play with the old MySpace XSS vulnerability and recreate the MySpace Samy Worm (JS.Spacehero) in HackEDU's MySpace Sandbox.
http://bit.ly/2Yw9uFR
Submitted May 17, 2019 at 03:06AM by jrkjared3
via reddit http://bit.ly/2JMy5lC
http://bit.ly/2Yw9uFR
Submitted May 17, 2019 at 03:06AM by jrkjared3
via reddit http://bit.ly/2JMy5lC
HackEDU
Interactive Cybersecurity Training | HackEDU
Interactive Cybersecurity Training. HackEDU offers comprehensive online Secure Development Training for your developers, engineers, and IT personnel to assist your organization in laying a foundation of security and application vulnerability prevention, assessment…
A Bug's Life: Story of a Solaris 0day - Marco Ivaldi - INFILTRATE 2019
http://bit.ly/2HpRxDd
Submitted May 17, 2019 at 06:35PM by 0xdea
via reddit http://bit.ly/2W4aZO9
http://bit.ly/2HpRxDd
Submitted May 17, 2019 at 06:35PM by 0xdea
via reddit http://bit.ly/2W4aZO9
Vimeo
A Bug's Life: Story of a Solaris 0day - Marco Ivaldi - INFILTRATE 2019
INFILTRATE 2020 will be held April 23/24, Miami Beach, Florida, infiltratecon.com
Stealing Downloads from Slack Users
http://bit.ly/2WaJAtM
Submitted May 17, 2019 at 07:25PM by DrinkMoreCodeMore
via reddit http://bit.ly/2JpTbqC
http://bit.ly/2WaJAtM
Submitted May 17, 2019 at 07:25PM by DrinkMoreCodeMore
via reddit http://bit.ly/2JpTbqC
Medium
Stealing Downloads from Slack Users
I’m going to go over an interesting feature abuse that could have been used to steal and even manipulate downloads from Slack users using the Slack desktop app on Windows. The vulnerability was…
Stealing Downloads from Slack Users
http://bit.ly/2WaJAtM
Submitted May 17, 2019 at 06:58PM by corp_account
via reddit http://bit.ly/2JMhoXA
http://bit.ly/2WaJAtM
Submitted May 17, 2019 at 06:58PM by corp_account
via reddit http://bit.ly/2JMhoXA
Medium
Stealing Downloads from Slack Users
I’m going to go over an interesting feature abuse that could have been used to steal and even manipulate downloads from Slack users using the Slack desktop app on Windows. The vulnerability was…
25,000+ Linksys WiFi routers are vulnerable to disclosing sensitive information about connected devices through a JNAP/ HTTP request.
http://bit.ly/2VoaYjE
Submitted May 17, 2019 at 09:49PM by _TjBrett_
via reddit http://bit.ly/2EhcSwR
http://bit.ly/2VoaYjE
Submitted May 17, 2019 at 09:49PM by _TjBrett_
via reddit http://bit.ly/2EhcSwR
BleepingComputer
Linksys Smart Wi-Fi Routers Leak Info of Connected Devices
More than 25,000 Linksys Smart Wi-Fi routers are currently impacted by an information disclosure vulnerability which allows remote and unauthenticated access to a vast array of sensitive device information.
Twitter disclosed on HackerOne: Twitter ID exposure via error-based...
http://bit.ly/2VtLnWA
Submitted May 18, 2019 at 01:38AM by terjanq
via reddit http://bit.ly/2Jpet7T
http://bit.ly/2VtLnWA
Submitted May 18, 2019 at 01:38AM by terjanq
via reddit http://bit.ly/2Jpet7T
HackerOne
Twitter disclosed on HackerOne: Twitter ID exposure via error-based...
Twitter ID Confirmator
===
## Summary
Recently I discovered a privacy-related vulnerability in Twitter. An attacker exploiting this vulnerability can identify a user when they visit a malicious...
===
## Summary
Recently I discovered a privacy-related vulnerability in Twitter. An attacker exploiting this vulnerability can identify a user when they visit a malicious...
Exploit for Linksys JNAP info leak vulnerability published as sn0int module
http://bit.ly/2QaDPaf
Submitted May 18, 2019 at 02:56PM by kpcyrd
via reddit http://bit.ly/2WMnScM
http://bit.ly/2QaDPaf
Submitted May 18, 2019 at 02:56PM by kpcyrd
via reddit http://bit.ly/2WMnScM
reddit
r/sn0int - kpcyrd/cve-2014-8244 0.1.0 - Get connected devices from linksys router via JNAP information leak
0 votes and 1 comment so far on Reddit
Hack The Box - Conceal Write-up by 0xRick
http://bit.ly/2JqC9ZF
Submitted May 18, 2019 at 08:32PM by Ahm3d_H3sham
via reddit http://bit.ly/2Wbq5RM
http://bit.ly/2JqC9ZF
Submitted May 18, 2019 at 08:32PM by Ahm3d_H3sham
via reddit http://bit.ly/2Wbq5RM
0xRick Owned Root !
Hack The Box - Conceal
Quick Summary Hey guys today Conceal retired and here’s my write-up about it. Conceal was a straightforward fun box, The only tricky part about it is gaining IPSEC connection to gain access to some filtered services. That first part involved some guessing…
Reverse Engineering the iClicker Base Station
http://bit.ly/2JR2ak3
Submitted May 18, 2019 at 09:36PM by ammar2
via reddit http://bit.ly/2Js6E1k
http://bit.ly/2JR2ak3
Submitted May 18, 2019 at 09:36PM by ammar2
via reddit http://bit.ly/2Js6E1k
Ammar's Blog
Reverse Engineering the iClicker Base Station
My blog, mostly about programming
Reverse Shell Cheatsheet
http://bit.ly/2WfFQag
Submitted May 19, 2019 at 02:04AM by mycall
via reddit http://bit.ly/2JP2xM3
http://bit.ly/2WfFQag
Submitted May 19, 2019 at 02:04AM by mycall
via reddit http://bit.ly/2JP2xM3
GitHub
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF - swisskyrepo/PayloadsAllTheThings
Reversing Golang Binaries: Part-2
http://bit.ly/2Qci3CE
Submitted May 19, 2019 at 12:06PM by nishan8583
via reddit http://bit.ly/2w8HEn0
http://bit.ly/2Qci3CE
Submitted May 19, 2019 at 12:06PM by nishan8583
via reddit http://bit.ly/2w8HEn0
Medium
Reversing Golang Binaries: Part-2
In the previous article I Disassembled a simple password validator go program. In this one lets go a big bigger. I will try to reverse a…
New research: How effective is basic account hygiene at preventing hijacking
http://bit.ly/2Hns6lz
Submitted May 19, 2019 at 11:58AM by digicat
via reddit http://bit.ly/2Q7GocQ
http://bit.ly/2Hns6lz
Submitted May 19, 2019 at 11:58AM by digicat
via reddit http://bit.ly/2Q7GocQ
Google Online Security Blog
New research: How effective is basic account hygiene at preventing hijacking
Posted by Kurt Thomas and Angelika Moscicki Every day, we protect users from hundreds of thousands of account hijacking attempts. Most at...